Exploiting Lack of Hardware Reciprocity for Sender-Node Authentication at the PHY Layer.
Muhammad Mahboob Ur RahmanAneela YasmeenQammer H. AbbasiPublished in: VTC Spring (2017)
Keyphrases
- abstraction layer
- low cost
- hidden nodes
- hardware and software
- real time
- biometric authentication
- hardware implementation
- vlsi implementation
- wide variety
- directed graph
- data acquisition
- computing systems
- digital watermarking
- image authentication
- embedded systems
- massively parallel
- computer systems
- authentication scheme
- identity management
- sensor networks